Important Chrome Browser Security Updates

In today’s world, we know that regularly installing updates for the applications and programs we use every day is the best way to ensure security. Security vulnerabilities can be exploited by hackers to steal data and create numerous problems. Now, this situation also applies to the Chrome browser. It is recommended to update your Google browser to avoid any attacks.

Chrome Update Fixes Security Vulnerabilities

According to Clément Lecigne and Vlada Stolyarova from Google’s Threat Analysis Group, a WebRTC bug, identified as CVE-2023-7024, was discovered a few days ago. Google is aware of the existence of an exploit that leverages this bug in the browser. What does this mean for users? First and foremost, they should immediately install the Chrome update. Currently, the bug does not pose a threat to iPhone or iPad users, but Chrome users on Android smartphones or computers should consider updating their systems.

The security vulnerability pertains to a buffer overflow in the browser and can be exploited by hackers to steal confidential data entered by users while using Chrome. There is also a risk that the vulnerability will be exploited to install malicious software that can intercept the information we type on virtual keyboards or even activate the camera on an infected device.

How to Install the Chrome Update?

To install the Chrome update on your computer, simply go to Settings, select Chrome, and then click on the Information option. There, you will be able to see the version of the browser you have and whether a new update is available. For PC computers, the new version will be marked as 120.0.6099.129/130, and for Mac and Linux computers as 120.0.6099.129. In the case of smartphones, you should go to the Google Play Store, open Chrome, and check if update 120.0.6099.144 is available. Additionally, it is worth checking how to install extensions in Chrome to enhance the browser’s functionalities.

Source: Google / press release

FAQ

What are exploits and zero-day vulnerabilities?

An exploit is code or a technique that exploits security vulnerabilities in applications, operating systems, or other programs to gain unauthorized access to data or compromise a system. A zero-day exploit means that the security vulnerability is known only to hackers, and software developers do not have enough time to release updates before the vulnerability is exploited. Therefore, attacks using zero-day exploits are particularly dangerous.

How to protect against exploit attacks?

To protect yourself against exploit attacks, always update your software to the latest version available from the provider. It is also important to use dedicated antivirus software that helps detect and block internet threats.

Source

https://example.com

The source of the article is from the blog elperiodicodearanjuez.es